函数Native化的Android APP加固方法

Yan Yan Song, Sen Lin Luo, Hai Shang, Li Min Pan*, Ji Zhang

*此作品的通讯作者

科研成果: 期刊稿件文章同行评审

3 引用 (Scopus)

摘要

The logic of dynamic recovery attack and the function call execution flow in Android APP was investigated. The original DEX file was reconstructed and encrypted; its key Java function attribute was changed to Native, and the shell DEX file was added. When the Android APP was started, the shell DEX file was executed first, and then the original DEX was decrypted and loaded dynamically. When the protected function was called, the Native property of the function in memory was maintained, and the original Java function was implicitly restored and executed by the Hook technique and the reflection mechanism. The experimental results show that the method obtains high level of protection without Source decompilation at lower resource losses, and can effectively resist static analysis attacks, DEX dynamic recovery and dynamic shelling attacks.

投稿的翻译标题Android APP reinforcement method with function Nativeization
源语言繁体中文
页(从-至)555-562
页数8
期刊Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science)
53
3
DOI
出版状态已出版 - 3月 2019

关键词

  • APP reinforcement
  • Android System
  • Dynamic loading
  • Function-Nativezation
  • Hook technology

指纹

探究 '函数Native化的Android APP加固方法' 的科研主题。它们共同构成独一无二的指纹。

引用此